Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
George Washington University Law School
 Chilling Effects Clearinghouse > Copyright and Fair Use > Notices > Diebold threatens Jim March (NoticeID 1423, http://chillingeffects.org/N/1423) Printer-friendly version

Diebold threatens Jim March

September 04, 2003

 

Sender Information:
Diebold Inc.
Sent by: [Private]
Walker and Jocke
US

Recipient Information:
Jim March
[Presently member of the BoD, Blackboxvoting.org - not at that time though]
USA


Sent via: Postal mail to my
Re: COPYRIGHT INFRINGEMENT

ATTORNEY-CLIENT COMMUNICATION / PRIVILEGED AND CONFIDENTIAL

Dear Mr. [Private, ISP]:

We represent Diebold, Incorporated and its wholly owned subsidiary Diebold Election Systems, Inc. (collectively "Diebold").

Diebold is the owner of copyrights in certain software, documentation, and other works of authorship associated with its proprietary electronic voting machines (

 
FAQ: Questions and Answers

[back to notice text]


Question: What does it mean if the cease-and-desist letter I got has a copyright notice?

Answer: Copyright can be claimed on any original expression, but some uses of copyrighted works, including use for commentary and criticism, are fair uses, not infringement. It is highly unlikely that someone could sue successfully for the posting of a cease-and-desist notice (most notices are minimally creative; the use is for purposes of commentary and research; the amount used is necessary to the understanding; and there is no effect on a "market" for cease-and-desist letters).


[back to notice text]


Question: Is a cease-and-desist letter confidential?

Answer: There is ordinarily no expectation of privacy or confidentiality in a letter sent to an adversary. Unless you have made a specific promise of confidentiality beforehand, such as in a protective agreement or NDA, a letter demanding confidentiality doesn't bind you.


[back to notice text]


Question: What rights are protected by copyright law?

Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are:

(1) the right of reproduction (i.e., copying),
(2) the right to create derivative works,
(3) the right to distribution,
(4) the right to performance,
(5) the right to display, and
(6) the digital transmission performance right.

The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright.

Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases.

Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement.

The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution.


[back to notice text]


Question: What kinds of things are copyrightable?

Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium.

Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV.

The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable.

Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however.


[back to notice text]


Question: What is copyright infringement? Are there any defenses?

Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above.

The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:


  1. the purpose and character of the use
  2. the nature of the copyrighted work
  3. the amount and substantiality of copying, and
  4. the market effect.

(17 U.S.C. 107)

The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use."

Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody.


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: Why does a web host or blogging service provider get DMCA takedown notices?

Answer: Many copyright claimants are making complaints under the Digital Millennium Copyright Act, Section 512(c)m a safe-harbor for hosts of "Information Residing on Systems or Networks At Direction of Users." This safe harbors give providers immunity from liability for users' possible copyright infringement -- if they "expeditiously" remove material when they get complaints. Whether or not the provider would have been liable for infringement by materials its users post, the provider can avoid the possibility of a lawsuit for money damages by following the DMCA's takedown procedure when it gets a complaint. The person whose information was removed can file a counter-notification if he or she believes the complaint was erroneous.

Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


Question: What are the provisions of 17 U.S.C. Section 512(c)(3) & 512(d)(3)?

Answer: Section 512(c)(3) sets out the elements for notification under the DMCA. Subsection A (17 U.S.C. 512(c)(3)(A)) states that to be effective a notification must include: 1) a physical/electronic signature of a person authorized to act on behalf of the owner of the infringed right; 2) identification of the copyrighted works claimed to have been infringed; 3) identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed; 4) information reasonably sufficient to permit the service provider to contact the complaining party (e.g., the address, telephone number, or email address); 5) a statement that the complaining party has a good faith belief that use of the material is not authorized by the copyright owner; and 6) a statement that information in the complaint is accurate and that the complaining party is authorized to act on behalf of the copyright owner. Subsection B (17 U.S.C. 512(c)(3)(B)) states that if the complaining party does not substantially comply with these requirements the notice will not serve as actual notice for the purpose of Section 512.

Section 512(d)(3), which applies to "information location tools" such as search engines and directories, incorporates the above requirements; however, instead of the identification of the allegedly infringing material, the notification must identify the reference or link to the material claimed to be infringing.


Question: Does a service provider have to follow the safe harbor procedures?

Answer: No. An ISP may choose not to follow the DMCA takedown process, and do without the safe harbor. If it would not be liable under pre-DMCA copyright law (for example, because it is not contributorily or vicariously liable, or because there is no underlying copyright infringement), it can still raise those same defenses if it is sued.


Question: How do I file a DMCA counter-notice?

Answer: If you believe your material was removed because of mistake or misidentification, you can file a "counter notification" asking the service provider to put it back up. Chilling Effects offers a form to build your own counter-notice.

For more information on the DMCA Safe Harbors, see the FAQs on DMCA Safe Harbor. For more information on Copyright and defenses to copyright infringement, see Copyright.


[back to notice text]


Question: What subject matter is not copyrightable?

Answer: Copyright protects original works of authorship fixed in a tangible medium. Copyright does not protect facts, ideas, procedures, processes, systems, methods of operation, concepts, principles, or discoveries. 17 U.S.C.


[back to notice text]


Question: What defenses are there to copyright infringement?

Answer: The primary defense to copyright infringement is "fair use." 17 U.S.C.


[back to notice text]


Question: If I am engaged in research, educational, or academic pursuits, does the fair use doctrine permit me to copy articles from a journal or periodical?

Answer: As mentioned in other FAQ answers in this section, it is hard to predict what a court will do when presented with a fair use defense. However, in this case the answer depends in part on your purposes in copying. If you intend to archive the copies, the answer is probably no, while if you intend to use the copies in classroom instruction (without charging for the copies), the use may be fair.

In 1995 the Second Circuit Court of Appeals held that it was not a fair use for research scientists at Texaco to photocopy articles from various scientific and technical journals. Texaco argued, on behalf of its scientists, that the use was for the purpose of research, and therefore was fair under Section 107. But the court was not convinced. In reaching its decision, the court in Texaco ran through the four factor fair use analysis (see In general, what types of uses does the fair use d...? and introduction to this Chilling Effects topic ). The court found that three of the four factors weighed against Texaco, and focused much of its opinion on the fourth factor, deciding that Texaco's use would have a significant impact on the potential market for the journal articles. Thus, in order to make copies of the articles, the research scientists at Texaco had to either pay for them or get express permission from the publishers.

Further, use of another's work for classroom instruction purposes may be protected under a separate provision of the Copyright Act. Section 110 of the Copyright Act contains exemptions that provide nonprofit educational institutions the limited right to use copyrighted materials in face-to-face classroom settings. This section provides: "Notwithstanding the provisions of section 106, the following are not infringements of copyright: (1) performance or display of a work by instructors or pupils in the course of face-to-face teaching activities of a nonprofit educational institution, in a classroom or similar place devoted to instruction . . . ."

Furthermore, the recently-enacted "Technology, Education, and Copyright Harmonization Act" -- the TEACH Act -- amends Section 110 to exempt certain uses of copyrighted works in the context of distance education (beyond the context of face-to-face teaching). The TEACH Act sets forth in detail the terms and conditions on which nonprofit educational institutions may use copyrighted works in the context of distance education (such as via websites or other digital means) without permission. More information on the TEACH Act.


[back to notice text]


Question: Do I need permission from the copyright holder to make fair use?

Answer: No. If your use is fair, it is not an infringement of copyright -- even if it is without the authorization of the copyright holder. Indeed, fair use is especially important to protect uses a copyright holder would not approve, such as criticism or parodies. See Campbell v. Acuff-Rose Music, 510 US 569 (1994).


[back to notice text]


Question: What is third-party liability, also known as "secondary liability"?

Answer: The concept of third party liability refers, as the name implies, to situations in which responsibility for harm can be placed on a party in addition to the one that actually caused the injury. The most common example comes from tort law: a customer in a grocery store drops a bottle of wine and another customer slips on the puddle and injures himself; he may bring an action for negligence against the customer who dropped the bottle and against the owner of the grocery store. Under the common law doctrine of third-party liability, a plaintiff must show not only that an injury actually occurred, but also (in most cases) that some sort of connection existed between the third party and the person who actually caused the injury.

As such the concept of third-party liability is often divided into two different types: contributory infringement and vicarious liability. Typically, contributory infringement exists when the third party either assists in the commission of the act which causes the injury, or simply induces the primary party to do so commit the act which caused the injury. (See What is contributory infringement?.) Vicarious liability often requires the third party to have exerted some form of control over the primary party


[back to notice text]


Question: What are the DMCA's anti-circumvention provisions?

Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works.

The DMCA contains four main provisions:

  1. a prohibition on circumventing access controls [1201(a)(1)(A)];
  2. an access control circumvention device ban (sometimes called the "trafficking" ban) [1201(a)(2)];
  3. a copyright protection circumvention device ban [1201(b)]; and,
  4. a prohibition on the removal of copyright management information (CMI) [1202(b)].

The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities.


[back to notice text]


Question: What are technological protection measures?

Answer: Technological protection systems are already in place in DVDs, eBooks, video game consoles, robotic toys, Internet streaming, and password-protected sections of web sites. The fact that a digital protection may be really weak and easy to circumvent has not prevented courts from applying this law to punish those who bypass them.

The DMCA defines an access control mechanism as a measure which "in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work." [1201(a)(3)(B)] An access control is a technology, like a password or encryption that controls who or what is able to interact with the copyrighted work. It is a violation of the DMCA to circumvent access controls, but it is also a violation to provide tools to others that circumvent access controls (including selling, distributing free of charge, and possibly even linking to a site with such technology


[back to notice text]


Question: What kind of authorization is required of the copyright owner in order to legally circumvent a system?

Answer: It depends. In general, the anti-circumvention provisions of the DMCA reserve broad authority to copyright holders to determine who can circumvent their systems.

For example, while the DMCA contains an encryption research exemption, to come under the exception, a researcher must request the permission from the copyright holder to engage in circumvention in order to be exempted [1201(g)(2)(C)]. In addition, under the DMCA only individuals who are studying, trained, or employed in encryption research are likely to be considered legitimate researchers under the law [1201(g)(3)(B)]. Finally, an encryption researcher is required to immediately notify the creator of the protection system when she breaks it. [1201(g)(3)(C)] The security testing exemption is even more restrictive in its rules about obtaining authorization from the copyright owner, requiring individuals engaged in security testing to not only request, but must actually obtain the authorization. [1201(j)(1)] On the other hand, the exemption relating to law enforcement, intelligence, and other government purposes have no such requirements to notify copyright owners of their activities. [1201(e)]

One important limitation to the control given to copyright owners is that manufacturers and developers of consumers electronics, telecommunications, or computing products are not required to design their products to respond to the digital protection systems implemented by copyright owners in their works. [1201(c)(3)] In this limitation, the DMCA anticipated the excessive control that copyright owners might exercise over the products used to play their works in addition to the works themselves.


[back to notice text]


Question: Are there exceptions in the DMCA to allow circumvention of technological protection systems?

Answer: There are seven exemptions built into section 1201 of the DMCA, some of which permit the circumvention of access and copy controls for limited purposes, some of which allow for the limited distribution of circumvention tools in particular circumstances. These seven exemptions are for:

  • Libraries, archives, and educational institutions for acquisition purposes; [1201(d)]
  • Law enforcement and intelligence gathering activities; [1201(e)]
  • Reverse engineering in order to develop interoperable programs; [1201(f)]
  • Encryption Research; [1201(g)]
  • Protecting minors from material on the Internet; [1201(h)]
  • Protecting the privacy of personally identifying information; [1201(i)]
  • Security Testing [1201(j)]

In addition to these seven exemptions, the Library of Congress is required every three years to exempt the circumvention of measures that prevent the "fair use" of copyrighted works. [1201(a)(1)(B-E)] The DMCA also contains provisions that ensure that the traditional rights of copyright law still apply to the DMCA. Section 1201(c)(1) provides that the rights, remedies, limitations, or defenses to claims of copyright infringement still apply. Section 1201(c)(4) states that these provisions should not affect the rights to free speech or freedom of the press for activities using electronics, telecommunications, or computing products.


[back to notice text]


Question: How is the First Amendment affected by the DMCA?

Answer: The tension between the DMCA and the First Amendment is at the heart of several ongoing lawsuits. [Felten v. RIAA; Universal v. Corley] The mere posting of a link to a computer program that can be used to circumvent technical protection measures was held to be a violation of the DMCA. [Universal v. Corley (2d Ciruit cite)] The Recording Industry Association of America used the threat of a DMCA action to silence a professor whose research paper discussed circumvention of a technical protection measure. The professor subsequently mounted a legal challenge to the DMCA on First Amendment grounds and presented his paper. While courts in both of these cases have found in favor of the copyright industries, these cases are being appealed and the state of the law is yet to be determined.


[back to notice text]


Question: Does a DMCA takedown mean the material taken down was infringing?

Answer: No. ISPs can take down material according to the DMCA anytime they receive a compliant notice alleging copyright infringement (see What are the notice and takedown procedures for we...?). The ISP does not have to investigate to determine whether the material was truly infringing before taking it down. The fact that someone has claimed infringement does not prove that infringement occurred -- there might be a fair use defense, or the claim might have been false or even frivolous.

In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions of the DMCA require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]

Identification of the material and its location before removal [512(g)(3)(B)]

A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]

Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the OSP for any damages that resulted from the improper removal of the material. [512(f)]


[back to notice text]


Question: What does the "reservation of rights" language mean? What are they "waiving" at me?

Answer: Many C&Ds will say something like, "This letter shall not be deemed to be a waiver of any rights or remedies, which are expressly reserved." This is just legalese for saying, "Even if you do what we ask in this letter, we can still sue you later." The language is standard; do not be alarmed. Litigation is extremely unpleasant, and unless your opponent is irrational (always a distinct possibility, of course), it will not bring litigation after it has obtained what it wants.


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: Does a service provider have to follow the safe harbor procedures?

Answer: No. An ISP may choose not to follow the DMCA takedown process, and do without the safe harbor. If it would not be liable under pre-DMCA copyright law (for example, because it is not contributorily or vicariously liable, or because there is no underlying copyright infringement), it can still raise those same defenses if it is sued.


Topic maintained by George Washington University Law School

Topic Frequently Asked Questions (and Answers)
Chilling Effects Clearinghouse - www.chillingeffects.org
disclaimer / privacy / about us & contacts